Week in security with Tony Anscombe

Share

When we hear about a breach, we assume that attackers used a fiendish exploit to breach the victim’s defenses – but is this how breaches typically occur?

When we hear about a breach, we assume that attackers used a fiendish exploit to breach the victim’s defenses – but is this how breaches typically occur? Also this week, we pondered the question, ‘is the world as we know it ready for the impact of deepfakes?’ Facebook has developed technology to confound facial recognition systems, including because they’re being misused for generating deepfakes. All this – and more – on WeLiveSecurity.com.

Latest Posts